How to construct random functions
Journal of the ACM (JACM)
Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
How to prove yourself: practical solutions to identification and signature problems
Proceedings on Advances in cryptology---CRYPTO '86
The knowledge complexity of interactive proof systems
SIAM Journal on Computing
Efficient Identification and Signatures for Smart Cards
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Wallet Databases with Observers
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
The Decision Diffie-Hellman Problem
ANTS-III Proceedings of the Third International Symposium on Algorithmic Number Theory
The security of vehicular ad hoc networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Privacy-Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks
MOBIQUITOUS '07 Proceedings of the 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking&Services (MobiQuitous)
On the effectiveness of changing pseudonyms to provide location privacy in VANETS
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile Generation in VANET
Information Security Applications
VPriv: protecting privacy in location-based vehicular services
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Traffic data collection for floating car data enhancement in V2I networks
EURASIP Journal on Advances in Signal Processing - Special title on vehicular ad hoc networks
PrETP: privacy-preserving electronic toll pricing
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
SEC'11 Proceedings of the 20th USENIX conference on Security
Journal of Network and Computer Applications
A framework for privacy and security analysis of probe-based traffic information systems
Proceedings of the 2nd ACM international conference on High confidence networked systems
Hi-index | 0.00 |
Floating Car Data (FCD) is a valuable source of up-to-date traffic information, with a wide range of applications. Active floating car data techniques require drivers to have their vehicles equipped with on-board units regularly transmitting position and velocity information to a central server. Many potential participants are hence reluctant to join FCD projects because of violations of their privacy due to permanent traceability or possible liability in case of speed limit violations. We present a general method for anonymization of floating car data by deriving pseudonyms for trips and samples with the optional ability of relating samples to trips and trips to each other, whilst hiding the identity of a driver, hence protecting his privacy. The resulting concepts are easy to implement and can be used as building blocks for any FCD system with stringent security constraints. The main advantage of our approach is the guaranteed uniqueness of pseudonyms that can be achieved efficiently, i.e. without any communication between vehicles.